US6122376A - State synchronized cipher text scrambler - Google Patents

State synchronized cipher text scrambler Download PDF

Info

Publication number
US6122376A
US6122376A US09/386,685 US38668599A US6122376A US 6122376 A US6122376 A US 6122376A US 38668599 A US38668599 A US 38668599A US 6122376 A US6122376 A US 6122376A
Authority
US
United States
Prior art keywords
scrambler
cipher text
keystream
state synchronized
input stream
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/386,685
Inventor
Sailesh Krishna Rao
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Level One Communications Inc
Original Assignee
Level One Communications Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/924,064 external-priority patent/US5946398A/en
Application filed by Level One Communications Inc filed Critical Level One Communications Inc
Priority to US09/386,685 priority Critical patent/US6122376A/en
Application granted granted Critical
Publication of US6122376A publication Critical patent/US6122376A/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03828Arrangements for spectral shaping; Arrangements for providing signals with specified spectral properties
    • H04L25/03866Arrangements for spectral shaping; Arrangements for providing signals with specified spectral properties using scrambling
    • H04L25/03872Parallel scrambling or descrambling

Definitions

  • This invention relates in general to a parallel cipher text scrambler, and more particularly to cipher text scrambler and method for scrambling multiple, parallel data streams so that the data streams are uncorrelated and have a fixed delay therebetween.
  • Communication information encryption is performed in digital data communications to provide security. Furthermore, communication applications require the sequence of data bits transmitted over a communication channel to be statistically random. In order to achieve the required degree of randomness, the data can be scrambled using a Maximal Length Pseudo Random Sequence. Maximal Length Pseudo Random Sequences are known to have the lowest possible auto-correlation, and are therefore the optimal choice for scrambling.
  • Block scrambling uses a framing pattern or other known means to provide the bits into some definable blocks of information. These bits are then exclusively OR'ed with a fixed pattern of bits synchronized to the boundaries of the block. Since a pattern of scrambling bits is fixed with respect to the block, the same pattern can be used at the receiver end to unscramble the bits. Any bit error occurring in the transmission channel between the transmitter and receiver will cause an error in that particular bit, but will not cause other bits to be in error, provided only that the receivers remain synchronized with the transmitters to the block boundaries. However, the longest framing pattern is not usually equal to the 2 n-1 length of the pseudo random pattern desired, so that only part of the pattern is used repetitively, introducing undesirable correlations in the data.
  • Stream scrambling of the known prior art generally operates on a continuous stream of bits.
  • the bits at the transmitting end of a communication channel to be scrambled are passed through one input of a two input exclusive OR gate.
  • the output of the gate is the output of the scrambler and also the input to an N-stage shift register.
  • This shift register is tapped at the Nth stage and one or more other stages, and the outputs of these taps are exclusively OR'ed together.
  • the result of this exclusive OR operation is applied to the other input of the exclusive OR gate that has the data to be scrambled, as the first input.
  • the tap positions are chosen so that a Galois polynomial represented by the tap weight is irreducible, and if the input data were all zeros and the shift register started out at any state other than all zeros, a Maximal Length Pseudo Random Sequence would be produced.
  • pulse patterns can have an energy component which is particularly high at certain discrete frequencies.
  • the digital signal to be transmitted must be scrambled at the transmitting side with a pseudo random sequence.
  • the descrambling occurs at the receiving side with the pseudo random sequence which was employed at the transmitting side.
  • the synchronization of the pseudo random generators employed at the transmitting receiving sides which is thereby necessary, can be avoided by employing freewheeling and, therefore, self synchronizing scrambler and descrambler arrangements.
  • modulating signals having a high clock frequency are often scrambled in a plurality of parallel channels having a lower bit repetition frequency.
  • the bit streams must be synchronized in order to reconstruct the original signal.
  • the present invention discloses a cipher text scrambler.
  • the present invention solves the above-described problems by providing a state synchronized cipher text scrambler which enables multiple data streams to be scrambled in parallel in such a way that the data streams are uncorrelated with respect to each other and which provides a large fixed delay relationship between the scrambler bits over multiple streams.
  • a system in accordance with the principles of the present invention includes a four parallel data scramblers for receiving input streams and converting them into cipher text outputs, wherein the first data scrambler includes a first shift register for generating a first keystream representing a generating polynomial, the second data scrambler generating a second keystream based on the first keystream using taps from the first shift register, the taps from the first shift register defining a second polynomial, the third data scrambler including a second shift register for generating a third keystream based on the second keystream, the second shift registers using the second polynomial and the fourth data scrambler including a third shift register for generating a fourth keystream based on the third keystream, the third shift registers using the second polynomial.
  • Another embodiments of a system in accordance with the principles of the invention may include alternative or optional additional aspects.
  • One such aspect of the present invention is that the second, third and fourth keystreams track the first polynomial when the first input stream has a correct polarity.
  • Another aspect of the present invention is that the second, third and fourth keystreams do not track the first keystream when the first input stream has an incorrect polarity.
  • Another aspect of the present invention is that a fixed delay occurs between the cipher text outputs.
  • Another aspect of the present invention is that the fixed delay is dependent upon the second polynomial.
  • Another aspect of the present invention is that the first, second, third and fourth cipher text outputs are uncorrelated with respect to each other.
  • FIG. 1 illustrates a transmit and receive side scrambler
  • FIG. 2 illustrates a scrambler using a 1+x 18 +x 23 polynomial
  • FIG. 3 illustrates a 4-pair state synchronized cipher text scrambler according to the present invention.
  • the present invention provides a state synchronized cipher text scrambler.
  • the state synchronized cipher text scrambler according to the present invention enables multiple data streams to be scrambled in parallel in such a way that the data streams are uncorrelated with respect to each other and there is a large fixed delay relationship between the scrambler bits over the multiple streams. This enables a receiver to correctly identify the ordering of the multiple data streams with respect to each other automatically, correct for any polarity or wire-swap misconnections and align the received multiple data streams despite differential delays between the data streams.
  • FIG. 1 illustrates a transmit 100 and receive 150 side scrambler.
  • Transmit scrambler 100 is used to randomize input data streams 102 so that the line signals so constructed are free of signal energy concentrated at specific frequencies and provides signal transitions adequate in number to assure reliable recovery of the data.
  • Cipher Text scramblers are typically constructed using Maximal Length Pseudo Random Sequence generators employing irreducible polynomials in the binary Galois field.
  • a Galois field addition, subtraction, multiplication and division by non-zero elements are all well-defined. There is an additive identity, 0, and a multiplicative identity, 1. Every non-zero number has a unique inverse and the commutative, associative, and distributive laws are true. Further, in Galois fields, all of the number theory works while numbers are kept at a finite size and division does not cause rounding errors.
  • a cipher text scrambler 100 input bits 102 are passed through one input 104 of a two input exclusive OR gate 106.
  • the output 108 of the gate 106 is the output of the scrambler 100.
  • the second input 110 of the exclusive OR gate 106 is produced by an N-stage shift register 120. This shift register is tapped at the Nth stage 122 and one or more other stages 124, and the outputs of these taps are exclusively OR'ed together 126.
  • the result 128 of this exclusive Or operation is applied to the input 130 of the N-stage shift register 120 and the second input 110 of the exclusive OR gate 106 that has the data to be scrambled, as the first input 104.
  • the result 128 at the second input 110 acts as the keystream for creating the cipher text output 108.
  • the tap positions 122, 124 are chosen so that a Galois polynomial represented by the tap weight is irreducible. The same arrangement can be used at the receiver end 150 to unscramble the scrambled receive bits 152.
  • the transmitter 100 and the receiver 150 achieve synchronization of the scrambler states during start-up initialization by, e.g., simply transmitting the zeroth bit 132 of the scrambler for a fixed period of time. Once such synchronization is achieved, the sender 100 and the receiver 150 can scramble and unscramble the data stream and thus achieve reliable data transmission.
  • cipher text scramblers are typically constructed using primitive polynomial in the binary Galois field. For example, 1+x 18 +x 23 is one such polynomial of degree 23, that is used in voiceband modems. Such polynomials are known to exist for every degree.
  • FIG. 2 illustrates a scrambler 200 using the 1+x 18 +x 23 polynomial.
  • the 22nd bit 210 of a shift register 212 is exclusively OR'ed 214 with the 17th bit 220 in order to derive a new input 230 for the register 212. If the register 212 is initialized with any non-zero bit sequence, then the register states pass through every possible combination of values (other than the all-zero state) before returning to the initialized value.
  • Any polynomial p(x), of lesser degree than the generating polynomial, g(x), of a scrambler 200 can be expressed in modulo arithmetic as:
  • N is a fixed number. To determine N, one can either use Zech logarithms or use the procedure as described herein below.
  • the scrambler register 212 is initialized with zeros except for the first register 232 which is initialized to 1. Now, the scrambler is advanced while the count of the advancement is monitored until the register states correspond to p(x). The number of advances is N.
  • N will be very large for a reasonably high degree polynomial g(x). This fact can be used to construct the state synchronized cipher text scrambler for a suitable choice of p(x) and g(x).
  • the 22nd bit 304 of a first shift register 306 is exclusively OR'ed 310 with the 17th bit 308 in order to provide a new input 312 to the register 306. Again, if the register 306 is initialized with any non-zero bit sequence, then the register 306 states pass through every possible combination of values (other than the all-zero state) before returning to the initialized value.
  • Pair B Scrambler 320 receives input data 321 at a first input 322 of an exclusive OR gate 324.
  • the first two registers 326, 328 of the Pair A Scrambler's 302 shift register 306 act as the register for the Pair B Scrambler.
  • the second bit 328 of the shift register 306 for Pair A Scrambler 302 is exclusively OR'ed 330 with the first bit 326 to produce a second input 332 to the exclusive OR gate 334.
  • the output of the second keystream exclusive OR gate 330 is also the new zeroth bit 336 of the register 342 for the Pair C Scrambler 340.
  • Pair C Scrambler 340 receives input data 343 at a first input 344 of an input exclusive OR gate 346.
  • the Pair C register 342 provides the second bit 348 of the shift register 342 which is exclusively OR'ed 350 with the first bit 352.
  • the output 354 of the third keystream exclusive OR gate 350 provides a second input 354 to the Pair C scrambler's 340 input exclusive OR gate 346.
  • the output of the register exclusive OR gate 350 is also the new input to the register 362 for the Pair D Scrambler 360.
  • Pair D Scrambler 360 receives input data 364 at a first input 336 of an input exclusive OR gate 368.
  • the Pair D register 362 provides the second bit 370 of the shift register 362 which is exclusively OR'ed 372 with the first bit 374.
  • the output of the register exclusive OR gate 376 provides a second input 378 to the Pair D scrambler's 360 input exclusive OR gate 368.
  • the 4-pair state synchronized cipher text scrambler 300 sequence obeys or tracks the generating polynomial of the first register 306, g(x), on every pair. If the scrambler sequence is inverted, i.e., if the receiver has an incorrect polarity on the wires, the sequence will not obey the generating polynomial, g(x), at all. This allows the receiver to correct for such errors automatically.
  • the 4-pair state synchronized cipher text scrambler 300 also provides a fixed delay between the pairs.
  • the fixed delay depends upon the polynomial of the second 390, third 342 and fourth 362 registers, p(x).
  • the scrambler output sequence 380 on pair B 320 is delayed with respect the output sequence 382 of pair A 302 by a large fixed amount.
  • the output sequence 384 on pair C 340 is delayed with respect to the output sequence 380 of pair B 320 by the same large fixed amount.
  • the output sequence 386 of pair D 360 is delayed with respect to the output sequence of pair C 360 by this amount as well.
  • the scrambler sequence on any pair is essentially uncorrelated with respect to the sequence on any other pair.
  • the receiver can hypothesize the ordering and differential delay, if any, check that the bit-wise relationship between the sequences obtained on each pair holds, and correct for incorrect wire-pair connections.
  • the state synchronized cipher-text scrambler allows multiple data streams to be scrambled and synchronized in such a manner that the receiver at the other end can correct for incorrectly swapped connections, align the data streams in the presence of differential delays between the data streams and perform automatic polarity correction on each of the received streams.
  • the state synchronized cipher-text scrambler does so without introducing error multiplication, unlike conventional self-synchronizing scramblers.

Abstract

A state synchronized cipher text scrambler is disclosed. The state synchronized cipher text scrambler enables multiple data streams to be scrambled in parallel in such a way that the data streams are uncorrelated with respect to each other and there is a large fixed delay relationship between the scrambler bits over the multiple streams. This enables a receiver to correctly identify the ordering of the multiple data streams with respect to each other automatically, correct for any polarity or wire-swap misconnections and align the received multiple data streams despite differential delays between the data streams.

Description

This application is a Continuation of application Ser. No. 08/924,064, filed Aug. 28, 1997, which application are incorporated herein by reference, now U.S. Pat. No. 5,946,398.
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates in general to a parallel cipher text scrambler, and more particularly to cipher text scrambler and method for scrambling multiple, parallel data streams so that the data streams are uncorrelated and have a fixed delay therebetween.
2. Description of Related Art
Communication information encryption is performed in digital data communications to provide security. Furthermore, communication applications require the sequence of data bits transmitted over a communication channel to be statistically random. In order to achieve the required degree of randomness, the data can be scrambled using a Maximal Length Pseudo Random Sequence. Maximal Length Pseudo Random Sequences are known to have the lowest possible auto-correlation, and are therefore the optimal choice for scrambling.
Two techniques have been generally used in the prior art to perform the scrambling operation: block scrambling and stream scrambling. Both techniques take advantage of the fact that when a first sequence of bits is exclusively OR'ed with a second sequence of bits and is then again exclusively OR'ed with the second sequence of bits identically aligned, the output is the first sequence just as it was before any exclusive OR operations were performed.
Block scrambling uses a framing pattern or other known means to provide the bits into some definable blocks of information. These bits are then exclusively OR'ed with a fixed pattern of bits synchronized to the boundaries of the block. Since a pattern of scrambling bits is fixed with respect to the block, the same pattern can be used at the receiver end to unscramble the bits. Any bit error occurring in the transmission channel between the transmitter and receiver will cause an error in that particular bit, but will not cause other bits to be in error, provided only that the receivers remain synchronized with the transmitters to the block boundaries. However, the longest framing pattern is not usually equal to the 2n-1 length of the pseudo random pattern desired, so that only part of the pattern is used repetitively, introducing undesirable correlations in the data.
Stream scrambling of the known prior art generally operates on a continuous stream of bits. In typical implementation, the bits at the transmitting end of a communication channel to be scrambled are passed through one input of a two input exclusive OR gate. The output of the gate is the output of the scrambler and also the input to an N-stage shift register. This shift register is tapped at the Nth stage and one or more other stages, and the outputs of these taps are exclusively OR'ed together. The result of this exclusive OR operation is applied to the other input of the exclusive OR gate that has the data to be scrambled, as the first input. The tap positions are chosen so that a Galois polynomial represented by the tap weight is irreducible, and if the input data were all zeros and the shift register started out at any state other than all zeros, a Maximal Length Pseudo Random Sequence would be produced.
As mentioned, pulse patterns can have an energy component which is particularly high at certain discrete frequencies. In order to avoid these pulse patterns, the digital signal to be transmitted must be scrambled at the transmitting side with a pseudo random sequence. The descrambling occurs at the receiving side with the pseudo random sequence which was employed at the transmitting side. The synchronization of the pseudo random generators employed at the transmitting receiving sides which is thereby necessary, can be avoided by employing freewheeling and, therefore, self synchronizing scrambler and descrambler arrangements. In order to achieve high bit rates, modulating signals having a high clock frequency are often scrambled in a plurality of parallel channels having a lower bit repetition frequency. However, the bit streams must be synchronized in order to reconstruct the original signal.
Thus it can be seen that there is a need for a cipher text scrambler which enables multiple data streams to be scrambled in parallel in such a way that the data streams are uncorrelated with respect to each other.
It can also be seen that there is a need for a cipher text scrambler that provides a large fixed delay relationship between the scrambler bits over the multiple streams.
It can also be seen that there is a need to provide a cipher text scrambler that can correctly identify the ordering of the multiple data streams with the respect to each other, correct for any polarity or wore swap misconnections and align the received multiple data streams despite differential delays between the data streams.
SUMMARY OF THE INVENTION
To overcome the limitations in the prior art described above, and to overcome other limitations that will become apparent upon reading and understanding the present specification, the present invention discloses a cipher text scrambler.
The present invention solves the above-described problems by providing a state synchronized cipher text scrambler which enables multiple data streams to be scrambled in parallel in such a way that the data streams are uncorrelated with respect to each other and which provides a large fixed delay relationship between the scrambler bits over multiple streams.
A system in accordance with the principles of the present invention includes a four parallel data scramblers for receiving input streams and converting them into cipher text outputs, wherein the first data scrambler includes a first shift register for generating a first keystream representing a generating polynomial, the second data scrambler generating a second keystream based on the first keystream using taps from the first shift register, the taps from the first shift register defining a second polynomial, the third data scrambler including a second shift register for generating a third keystream based on the second keystream, the second shift registers using the second polynomial and the fourth data scrambler including a third shift register for generating a fourth keystream based on the third keystream, the third shift registers using the second polynomial.
Other embodiments of a system in accordance with the principles of the invention may include alternative or optional additional aspects. One such aspect of the present invention is that the second, third and fourth keystreams track the first polynomial when the first input stream has a correct polarity.
Another aspect of the present invention is that the second, third and fourth keystreams do not track the first keystream when the first input stream has an incorrect polarity.
Another aspect of the present invention is that a fixed delay occurs between the cipher text outputs.
Another aspect of the present invention is that the fixed delay is dependent upon the second polynomial.
Another aspect of the present invention is that the first, second, third and fourth cipher text outputs are uncorrelated with respect to each other.
These and various other advantages and features of novelty which characterize the invention are pointed out with particularity in the claims annexed hereto and form a part hereof. However, for a better understanding of the invention, its advantages, and the objects obtained by its use, reference should be made to the drawings which form a further part hereof, and to accompanying descriptive matter, in which there are illustrated and described specific examples of an apparatus in accordance with the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
Referring now to the drawings in which like reference numbers represent corresponding parts throughout:
FIG. 1 illustrates a transmit and receive side scrambler;
FIG. 2 illustrates a scrambler using a 1+x18 +x23 polynomial; and
FIG. 3 illustrates a 4-pair state synchronized cipher text scrambler according to the present invention.
DETAILED DESCRIPTION OF THE INVENTION
In the following description of the exemplary embodiment, reference is made to the accompanying drawings which form a part hereof, and in which is shown by way of illustration the specific embodiment in which the invention may be practiced. It is to be understood that other embodiments may be utilized as structural changes may be made without departing from the scope of the present invention.
The present invention provides a state synchronized cipher text scrambler. The state synchronized cipher text scrambler according to the present invention enables multiple data streams to be scrambled in parallel in such a way that the data streams are uncorrelated with respect to each other and there is a large fixed delay relationship between the scrambler bits over the multiple streams. This enables a receiver to correctly identify the ordering of the multiple data streams with respect to each other automatically, correct for any polarity or wire-swap misconnections and align the received multiple data streams despite differential delays between the data streams.
FIG. 1 illustrates a transmit 100 and receive 150 side scrambler. Transmit scrambler 100 is used to randomize input data streams 102 so that the line signals so constructed are free of signal energy concentrated at specific frequencies and provides signal transitions adequate in number to assure reliable recovery of the data.
Cipher Text scramblers are typically constructed using Maximal Length Pseudo Random Sequence generators employing irreducible polynomials in the binary Galois field. In a Galois field, addition, subtraction, multiplication and division by non-zero elements are all well-defined. There is an additive identity, 0, and a multiplicative identity, 1. Every non-zero number has a unique inverse and the commutative, associative, and distributive laws are true. Further, in Galois fields, all of the number theory works while numbers are kept at a finite size and division does not cause rounding errors.
In a cipher text scrambler 100, input bits 102 are passed through one input 104 of a two input exclusive OR gate 106. The output 108 of the gate 106 is the output of the scrambler 100. The second input 110 of the exclusive OR gate 106 is produced by an N-stage shift register 120. This shift register is tapped at the Nth stage 122 and one or more other stages 124, and the outputs of these taps are exclusively OR'ed together 126. The result 128 of this exclusive Or operation is applied to the input 130 of the N-stage shift register 120 and the second input 110 of the exclusive OR gate 106 that has the data to be scrambled, as the first input 104. The result 128 at the second input 110 acts as the keystream for creating the cipher text output 108. The tap positions 122, 124 are chosen so that a Galois polynomial represented by the tap weight is irreducible. The same arrangement can be used at the receiver end 150 to unscramble the scrambled receive bits 152.
The transmitter 100 and the receiver 150 achieve synchronization of the scrambler states during start-up initialization by, e.g., simply transmitting the zeroth bit 132 of the scrambler for a fixed period of time. Once such synchronization is achieved, the sender 100 and the receiver 150 can scramble and unscramble the data stream and thus achieve reliable data transmission.
As suggested above, cipher text scramblers are typically constructed using primitive polynomial in the binary Galois field. For example, 1+x18 +x23 is one such polynomial of degree 23, that is used in voiceband modems. Such polynomials are known to exist for every degree.
FIG. 2 illustrates a scrambler 200 using the 1+x18 +x23 polynomial. To construct the scrambler 200, the 22nd bit 210 of a shift register 212 is exclusively OR'ed 214 with the 17th bit 220 in order to derive a new input 230 for the register 212. If the register 212 is initialized with any non-zero bit sequence, then the register states pass through every possible combination of values (other than the all-zero state) before returning to the initialized value.
Any polynomial p(x), of lesser degree than the generating polynomial, g(x), of a scrambler 200 can be expressed in modulo arithmetic as:
p(x)=x.sup.N modulo g(x)
where N is a fixed number. To determine N, one can either use Zech logarithms or use the procedure as described herein below.
First, the scrambler register 212 is initialized with zeros except for the first register 232 which is initialized to 1. Now, the scrambler is advanced while the count of the advancement is monitored until the register states correspond to p(x). The number of advances is N.
Typically, for simple functions, e.g., x+x2, N will be very large for a reasonably high degree polynomial g(x). This fact can be used to construct the state synchronized cipher text scrambler for a suitable choice of p(x) and g(x).
FIG. 3 illustrates a 4-pair state synchronized cipher text scrambler 300 constructed using the polynomials g(x)=1+18 +x23 and p(x)=x+x2. However, those skilled in the art will recognize that the invention is not meant to be limited to these two polynomials. Other polynomials can be used in accordance with the teaching of the invention.
The scrambler for pair A 302 uses the polynomial g(x)=1+18 +x23 as illustrated in FIG. 2. Pair A scrambler 302 receives first input data 303. The 22nd bit 304 of a first shift register 306 is exclusively OR'ed 310 with the 17th bit 308 in order to provide a new input 312 to the register 306. Again, if the register 306 is initialized with any non-zero bit sequence, then the register 306 states pass through every possible combination of values (other than the all-zero state) before returning to the initialized value.
Scramblers for Pairs B 320, C 340, and D 360 use the polynomial p(x)=x+x2. Pair B Scrambler 320 receives input data 321 at a first input 322 of an exclusive OR gate 324. The first two registers 326, 328 of the Pair A Scrambler's 302 shift register 306 act as the register for the Pair B Scrambler. The second bit 328 of the shift register 306 for Pair A Scrambler 302 is exclusively OR'ed 330 with the first bit 326 to produce a second input 332 to the exclusive OR gate 334. The output of the second keystream exclusive OR gate 330 is also the new zeroth bit 336 of the register 342 for the Pair C Scrambler 340.
Pair C Scrambler 340 receives input data 343 at a first input 344 of an input exclusive OR gate 346. The Pair C register 342 provides the second bit 348 of the shift register 342 which is exclusively OR'ed 350 with the first bit 352. The output 354 of the third keystream exclusive OR gate 350 provides a second input 354 to the Pair C scrambler's 340 input exclusive OR gate 346. The output of the register exclusive OR gate 350 is also the new input to the register 362 for the Pair D Scrambler 360.
Pair D Scrambler 360 receives input data 364 at a first input 336 of an input exclusive OR gate 368. The Pair D register 362 provides the second bit 370 of the shift register 362 which is exclusively OR'ed 372 with the first bit 374. The output of the register exclusive OR gate 376 provides a second input 378 to the Pair D scrambler's 360 input exclusive OR gate 368.
The 4-pair state synchronized cipher text scrambler 300 sequence obeys or tracks the generating polynomial of the first register 306, g(x), on every pair. If the scrambler sequence is inverted, i.e., if the receiver has an incorrect polarity on the wires, the sequence will not obey the generating polynomial, g(x), at all. This allows the receiver to correct for such errors automatically.
The 4-pair state synchronized cipher text scrambler 300 also provides a fixed delay between the pairs. The fixed delay depends upon the polynomial of the second 390, third 342 and fourth 362 registers, p(x). The scrambler output sequence 380 on pair B 320 is delayed with respect the output sequence 382 of pair A 302 by a large fixed amount. The output sequence 384 on pair C 340 is delayed with respect to the output sequence 380 of pair B 320 by the same large fixed amount. The output sequence 386 of pair D 360 is delayed with respect to the output sequence of pair C 360 by this amount as well.
Further, the scrambler sequence on any pair is essentially uncorrelated with respect to the sequence on any other pair. Once polarity is checked and corrected, the receiver can hypothesize the ordering and differential delay, if any, check that the bit-wise relationship between the sequences obtained on each pair holds, and correct for incorrect wire-pair connections.
In summary, the state synchronized cipher-text scrambler allows multiple data streams to be scrambled and synchronized in such a manner that the receiver at the other end can correct for incorrectly swapped connections, align the data streams in the presence of differential delays between the data streams and perform automatic polarity correction on each of the received streams. The state synchronized cipher-text scrambler does so without introducing error multiplication, unlike conventional self-synchronizing scramblers.
The foregoing description of the exemplary embodiment of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not with this detailed description, but rather by the claims appended hereto.

Claims (28)

What is claimed is:
1. A state synchronized cipher text scrambler, comprising:
a first data scrambler for receiving a first input stream and converting the first input stream to a first cipher text output, the first data scrambler further comprising a first pseudo random sequence generator for generating a first keystream for converting the first input stream to the first cipher text output; and
a second data scrambler, operatively coupled to the first data scrambler, for receiving a second input stream and converting the second input stream to a second cipher text output, the second data scrambler receiving a second keystream from the first pseudo random sequence generator, the second keystream being used to convert the second input stream to the second cipher text output, the first and second cipher text outputs being uncorrelated.
2. The state synchronized cipher text scrambler of claim 1 further comprising at least a third data scrambler operatively coupled the second data scrambler, the third data scrambler receiving at least a third input data stream and further comprising a third pseudo random sequence generator for generating a third keystream based on the second keystream for converting the third input stream to the third cipher text output.
3. The state synchronized cipher text scrambler of claim 2 further comprising at least a fourth data scrambler operatively coupled the third data scrambler, for receiving at least a fourth input data stream, the fourth data scrambler comprising a fourth pseudo random sequence generator for generating a fourth keystream based on the third keystream for converting the fourth input stream to the fourth cipher text output.
4. The state synchronized cipher text scrambler of claim 3 wherein the first pseudo random generator uses a first primitive polynomial to generate the first keystream and the second, third and fourth keystreams are derived using a second primitive polynomial.
5. The state synchronized cipher text scrambler of claim 4 further comprising a fixed delay between the cipher text outputs.
6. The state synchronized cipher text scrambler of claim 5 wherein the fixed delay is dependent upon the second primitive polynomial.
7. The state synchronized cipher text scrambler of claim 3 wherein the second, third and fourth keystreams track the first keystream when the first input stream has a correct polarity.
8. The state synchronized cipher text scrambler of claim 3 wherein the second, third and fourth keystreams do not track the first keystream when the first input stream has an incorrect polarity.
9. The state synchronized cipher text scrambler of claim 8 wherein the coupling of the first, second, third and fourth scramblers allow a receiver to automatically correct for errors.
10. The state synchronized cipher text scrambler of claim 3 wherein the first, second, third and fourth cipher text outputs are uncorrelated with respect to each other.
11. The state synchronized cipher text scrambler of claim 1 wherein the first and second cipher text outputs are uncorrelated.
12. The state synchronized cipher text scrambler of claim 1, wherein the first pseudo random sequence generator employs a first polynomial for generating the first keystream for converting the first input stream to the first cipher text output, the second keystream is derived from a second polynomial.
13. A state synchronized cipher text scrambler, comprising N parallel data scramblers for receiving N parallel input streams and converting the N parallel input streams to N parallel cipher text outputs, an Nth parallel data scrambler further comprising an Nth pseudo random sequence generator for providing an Nth keystream for converting an input stream to a cipher text output, and wherein the Nth keystream is based upon a (N-1)th keystream, and the N parallel cipher text outputs being uncorrelated.
14. The state synchronized cipher text scrambler of claim 13 wherein a first keystream is based on a first polynomial and the other N-1 keystreams are based on a second polynomial.
15. The state synchronized cipher text scrambler of claim 14 wherein the other N-1 keystreams track the first keystream when a first input stream has a correct polarity.
16. The state synchronized cipher text scrambler of claim 14 wherein the other N-1 keystreams do not track the first keystream when a first input stream has an incorrect polarity.
17. The state synchronized cipher text scrambler of claim 14 wherein the fixed delay is dependent upon the second primitive polynomial.
18. The state synchronized cipher text scrambler of claim 13 wherein the N pseudo random sequence generators comprise N feedback shift registers.
19. The state synchronized cipher text scrambler of claim 18 wherein a first feedback shift register generates a keystream using a 1+x18 +x23 polynomial and N-1 feedback shift generators generate keystreams using a x+x2 polynomial.
20. The state synchronized cipher text scrambler of claim 13 further comprising a fixed delay between the cipher text outputs.
21. The state synchronized cipher text scrambler of claim 13 wherein the N parallel cipher text outputs are uncorrelated with respect to each other.
22. The state synchronized cipher text scrambler of claim 13, wherein at least one of the N parallel data scramblers using a polynomial for generating a keystream.
23. A state synchronized cipher text scrambler, comprising:
a first data scrambler for receiving a first input stream and converting the first input stream to a first cipher text output, the first data scrambler comprising a first shift register for generating a first keystream representing a generating polynomial;
a second data scrambler for receiving a second input stream and converting the second input stream to a second cipher text output, the second data scrambler generating a second keystream based on the first keystream using taps from the first shift register, the taps from the first shift register defining a second polynomial;
a third data scrambler for receiving a third input stream and converting the third input stream to a third cipher text output, the third data scrambler comprising a second shift register for generating a third keystream based on the second keystream, the second shift registers using the second polynomial; and
a fourth data scrambler for receiving a fourth input stream and converting the fourth input stream to a fourth cipher text output, the fourth data scrambler comprising a third shift register for generating a fourth keystream based on the third keystream, the third shift registers using the second polynomial.
24. The state synchronized cipher text scrambler of claim 23 wherein the second, third and fourth keystreams track the first polynomial when the first input stream has a correct polarity.
25. The state synchronized cipher text scrambler of claim 23 wherein the second, third and fourth keystreams do not track the first keystream when the first input stream has an incorrect polarity.
26. The state synchronized cipher text scrambler of claim 23 further comprising a fixed delay between the cipher text outputs.
27. Th state synchronized cipher text scrambler of claim 26 wherein the fixed delay is dependent upon the second polynomial.
28. The state synchronized cipher text scrambler of claim 23 wherein the first, second, third and fourth cipher text outputs are uncorrelated with respect to each other.
US09/386,685 1997-08-28 1999-08-31 State synchronized cipher text scrambler Expired - Lifetime US6122376A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/386,685 US6122376A (en) 1997-08-28 1999-08-31 State synchronized cipher text scrambler

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/924,064 US5946398A (en) 1997-03-25 1997-08-28 State synchronized cipher text scrambler
US09/386,685 US6122376A (en) 1997-08-28 1999-08-31 State synchronized cipher text scrambler

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US08/924,064 Continuation US5946398A (en) 1997-03-25 1997-08-28 State synchronized cipher text scrambler

Publications (1)

Publication Number Publication Date
US6122376A true US6122376A (en) 2000-09-19

Family

ID=25449659

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/386,685 Expired - Lifetime US6122376A (en) 1997-08-28 1999-08-31 State synchronized cipher text scrambler

Country Status (1)

Country Link
US (1) US6122376A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050053240A1 (en) * 2003-09-09 2005-03-10 Peter Lablans Ternary and higher multi-value digital scramblers/descramblers
US20050184888A1 (en) * 2004-02-25 2005-08-25 Peter Lablans Generation and detection of non-binary digital sequences
US20050185796A1 (en) * 2004-02-25 2005-08-25 Peter Lablans Ternary and multi-value digital signal scramblers, descramblers and sequence generators
US20050194993A1 (en) * 2004-02-25 2005-09-08 Peter Lablans Single and composite binary and multi-valued logic functions from gates and inverters
US20060021003A1 (en) * 2004-06-23 2006-01-26 Janus Software, Inc Biometric authentication system
US20060031278A1 (en) * 2004-08-07 2006-02-09 Peter Lablans Multi-value digital calculating circuits, including multipliers
US20070110229A1 (en) * 2004-02-25 2007-05-17 Ternarylogic, Llc Ternary and Multi-Value Digital Signal Scramblers, Descramblers and Sequence of Generators
US7227949B2 (en) 2002-01-31 2007-06-05 Texas Instruments Incorporated Separate self-synchronizing packet-based scrambler having replay variation
US20070239812A1 (en) * 2006-04-05 2007-10-11 Peter Lablans Binary And N-Valued LFSR And LFCSR Based Scramblers, Descramblers, Sequence Generators and Detectors In Galois Configuration
US20090092250A1 (en) * 2007-04-04 2009-04-09 Peter Lablans Methods and Systems for N-State Signal Processing with Binary Devices
US20090128190A1 (en) * 2004-02-25 2009-05-21 Peter Lablans Implementing Logic Functions with Non-Magnitude Based Physical Phenomena
US7548092B2 (en) 2004-02-25 2009-06-16 Ternarylogic Llc Implementing logic functions with non-magnitude based physical phenomena
US20100164548A1 (en) * 2004-09-08 2010-07-01 Ternarylogic Llc Implementing Logic Functions With Non-Magnitude Based Physical Phenomena
US20110064214A1 (en) * 2003-09-09 2011-03-17 Ternarylogic Llc Methods and Apparatus in Alternate Finite Field Based Coders and Decoders
US8374289B2 (en) 2004-02-25 2013-02-12 Ternarylogic Llc Generation and detection of non-binary digital sequences
US8577026B2 (en) 2010-12-29 2013-11-05 Ternarylogic Llc Methods and apparatus in alternate finite field based coders and decoders

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3054857A (en) * 1955-04-18 1962-09-18 Paramount Pictures Corp Secrecy system
US3059054A (en) * 1958-04-28 1962-10-16 Paramount Pictures Corp Audio nonsense generator
US3784743A (en) * 1972-08-23 1974-01-08 Bell Telephone Labor Inc Parallel data scrambler
US3967066A (en) * 1941-09-24 1976-06-29 Bell Telephone Labor Inc ecret telephony
US4304962A (en) * 1965-08-25 1981-12-08 Bell Telephone Laboratories, Incorporated Data scrambler
US4663501A (en) * 1984-08-08 1987-05-05 Siemens Aktiengesellschaft Self-synchronizing descrambler
US4744104A (en) * 1984-06-04 1988-05-10 Siemens Aktiengesellschaft Self-synchronizing scrambler
US5163092A (en) * 1990-11-28 1992-11-10 Siemens Aktiengesellschaft Parallel scrambler used in sonet data transmission
US5185799A (en) * 1990-11-28 1993-02-09 Siemens Aktiengesellschaft Parallel scrambler used in SONET data transmission
US5377265A (en) * 1992-01-31 1994-12-27 Alcatel N.V. Parallel additive scrambler and descrambler
US5448640A (en) * 1993-03-18 1995-09-05 Electronics And Telecommunications Research Institute Parallel distributed sample descrambling circuit for cell-based asynchronous transfer mode physical layer
US5946398A (en) * 1997-03-25 1999-08-31 Level One Communications, Inc. State synchronized cipher text scrambler

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3967066A (en) * 1941-09-24 1976-06-29 Bell Telephone Labor Inc ecret telephony
US3054857A (en) * 1955-04-18 1962-09-18 Paramount Pictures Corp Secrecy system
US3059054A (en) * 1958-04-28 1962-10-16 Paramount Pictures Corp Audio nonsense generator
US4304962A (en) * 1965-08-25 1981-12-08 Bell Telephone Laboratories, Incorporated Data scrambler
US3784743A (en) * 1972-08-23 1974-01-08 Bell Telephone Labor Inc Parallel data scrambler
US4744104A (en) * 1984-06-04 1988-05-10 Siemens Aktiengesellschaft Self-synchronizing scrambler
US4663501A (en) * 1984-08-08 1987-05-05 Siemens Aktiengesellschaft Self-synchronizing descrambler
US5163092A (en) * 1990-11-28 1992-11-10 Siemens Aktiengesellschaft Parallel scrambler used in sonet data transmission
US5185799A (en) * 1990-11-28 1993-02-09 Siemens Aktiengesellschaft Parallel scrambler used in SONET data transmission
US5377265A (en) * 1992-01-31 1994-12-27 Alcatel N.V. Parallel additive scrambler and descrambler
US5448640A (en) * 1993-03-18 1995-09-05 Electronics And Telecommunications Research Institute Parallel distributed sample descrambling circuit for cell-based asynchronous transfer mode physical layer
US5946398A (en) * 1997-03-25 1999-08-31 Level One Communications, Inc. State synchronized cipher text scrambler

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Taso, S. H., "Generation of delayed replicas of maximal length linear binary sequences," Proc. IEE, vol. 111, No. 11, pp. 1803-1806 (Nov. 1964).
Taso, S. H., Generation of delayed replicas of maximal length linear binary sequences, Proc. IEE , vol. 111, No. 11, pp. 1803 1806 (Nov. 1964). *

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7227949B2 (en) 2002-01-31 2007-06-05 Texas Instruments Incorporated Separate self-synchronizing packet-based scrambler having replay variation
US20050084111A1 (en) * 2003-09-09 2005-04-21 Peter Lablans Ternary and higher multi-value digital scramblers/descramblers
US20110064214A1 (en) * 2003-09-09 2011-03-17 Ternarylogic Llc Methods and Apparatus in Alternate Finite Field Based Coders and Decoders
US7864079B1 (en) 2003-09-09 2011-01-04 Ternarylogic Llc Ternary and higher multi-value digital scramblers/descramblers
US20100322414A1 (en) * 2003-09-09 2010-12-23 Ternarylogic Llc Ternary and higher multi-value digital scramblers/descramblers
US7505589B2 (en) 2003-09-09 2009-03-17 Temarylogic, Llc Ternary and higher multi-value digital scramblers/descramblers
US20090060202A1 (en) * 2003-09-09 2009-03-05 Peter Lablans Ternary and Higher Multi-Value Digital Scramblers/Descramblers
US7002490B2 (en) 2003-09-09 2006-02-21 Ternarylogic Llc Ternary and higher multi-value digital scramblers/descramblers
US20050053240A1 (en) * 2003-09-09 2005-03-10 Peter Lablans Ternary and higher multi-value digital scramblers/descramblers
US7218144B2 (en) 2004-02-25 2007-05-15 Ternarylogic Llc Single and composite binary and multi-valued logic functions from gates and inverters
US7548092B2 (en) 2004-02-25 2009-06-16 Ternarylogic Llc Implementing logic functions with non-magnitude based physical phenomena
US20070152710A1 (en) * 2004-02-25 2007-07-05 Peter Lablans Single and composite binary and multi-valued logic functions from gates and inverters
US8589466B2 (en) 2004-02-25 2013-11-19 Ternarylogic Llc Ternary and multi-value digital signal scramblers, decramblers and sequence generators
US7355444B2 (en) 2004-02-25 2008-04-08 Ternarylogic Llc Single and composite binary and multi-valued logic functions from gates and inverters
US8374289B2 (en) 2004-02-25 2013-02-12 Ternarylogic Llc Generation and detection of non-binary digital sequences
US20070110229A1 (en) * 2004-02-25 2007-05-17 Ternarylogic, Llc Ternary and Multi-Value Digital Signal Scramblers, Descramblers and Sequence of Generators
US20050185796A1 (en) * 2004-02-25 2005-08-25 Peter Lablans Ternary and multi-value digital signal scramblers, descramblers and sequence generators
US20110170697A1 (en) * 2004-02-25 2011-07-14 Ternarylogic Llc Ternary and Multi-Value Digital Signal Scramblers, Decramblers and Sequence Generators
US20090128190A1 (en) * 2004-02-25 2009-05-21 Peter Lablans Implementing Logic Functions with Non-Magnitude Based Physical Phenomena
US20050194993A1 (en) * 2004-02-25 2005-09-08 Peter Lablans Single and composite binary and multi-valued logic functions from gates and inverters
US20050184888A1 (en) * 2004-02-25 2005-08-25 Peter Lablans Generation and detection of non-binary digital sequences
US7580472B2 (en) 2004-02-25 2009-08-25 Ternarylogic Llc Generation and detection of non-binary digital sequences
US7643632B2 (en) 2004-02-25 2010-01-05 Ternarylogic Llc Ternary and multi-value digital signal scramblers, descramblers and sequence generators
US7696785B2 (en) 2004-02-25 2010-04-13 Ternarylogic Llc Implementing logic functions with non-magnitude based physical phenomena
US20060021003A1 (en) * 2004-06-23 2006-01-26 Janus Software, Inc Biometric authentication system
US20060031278A1 (en) * 2004-08-07 2006-02-09 Peter Lablans Multi-value digital calculating circuits, including multipliers
US7562106B2 (en) 2004-08-07 2009-07-14 Ternarylogic Llc Multi-value digital calculating circuits, including multipliers
US20100164548A1 (en) * 2004-09-08 2010-07-01 Ternarylogic Llc Implementing Logic Functions With Non-Magnitude Based Physical Phenomena
US7487194B2 (en) * 2006-04-05 2009-02-03 Peter Lablans Binary and n-valued LFSR and LFCSR based scramblers, descramblers, sequence generators and detectors in Galois configuration
US20070239812A1 (en) * 2006-04-05 2007-10-11 Peter Lablans Binary And N-Valued LFSR And LFCSR Based Scramblers, Descramblers, Sequence Generators and Detectors In Galois Configuration
US20090092250A1 (en) * 2007-04-04 2009-04-09 Peter Lablans Methods and Systems for N-State Signal Processing with Binary Devices
US8345873B2 (en) 2007-04-04 2013-01-01 Ternarylogic Llc Methods and systems for N-state signal processing with binary devices
US8577026B2 (en) 2010-12-29 2013-11-05 Ternarylogic Llc Methods and apparatus in alternate finite field based coders and decoders

Similar Documents

Publication Publication Date Title
US6122376A (en) State synchronized cipher text scrambler
US4771463A (en) Digital scrambling without error multiplication
US7227949B2 (en) Separate self-synchronizing packet-based scrambler having replay variation
US4639548A (en) Digital communication system including an error correcting encoder/decoder and a scrambler/descrambler
US3784743A (en) Parallel data scrambler
US3988538A (en) Digital data scrambler and descrambler
US6009135A (en) Method and apparatus for generating a stream cipher
US8000404B2 (en) Method and apparatus to reduce the effect of crosstalk in a communications interface
US4930139A (en) Spread spectrum communication system
US5946398A (en) State synchronized cipher text scrambler
US8364977B2 (en) Methods and systems for processing of n-state symbols with XOR and EQUALITY binary functions
EP0206319A2 (en) Data encoding/decoding circuit
US4214206A (en) Digital transmission system having direct bit extraction from scrambled bit streams
US6741636B1 (en) System and method for converting data into a noise-like waveform
JP2006100890A (en) Data transmission method and system, data transmitter and data receiver
US5629983A (en) Parallel transmission through plurality of optical fibers
EP0490618A1 (en) Scrambling/descrambling circuit
CA1243737A (en) Self-synchronizing scrambler
US4864617A (en) System and method for reducing deadlock conditions caused by repeated transmission of data sequences equivalent to those used for inter-device signalling
US7023881B1 (en) System and method for selectively scrambling multidimensional digital frame structure communications
JPS5936454A (en) Scrambler encoder integrated and using quasi-random sequence generator
AU683712B2 (en) Device for establishing cell boundaries in a bit stream and CRC calculation
TWI412238B (en) Method and apparatus to reduce the effect of crosstalk in a communications interface
JPS62178086A (en) Enciphering device
JP2789679B2 (en) Parity signal insertion circuit

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12